Background: The need for assisted reproduction technologies (ART) for the establishment of pregnancies has steadily increased worldwide. Therefore, it is of vital importance that an efficient sperm preparation technique used for retrieval of high-quality spermatozoa contributes to the creations of high-quality embryos, with high implantation potential.
Objective: to study the effect of swim up technique on human sperm motility and DNA integrity.
Subject and methods: A prospective study carried on 70 samples of human semen; each sample, divided into 2 parts, one part was prepared by swim-up technique and the other not, and then study sperm motility and DNA integrity in both parts. Sperm DNA integrity was determined using a modified alkaline single cell gel electrophoresis (comet) assay and acridine orange test (AOT), and motility was determined by light microscope.
Result(s): the results showed that swim up technique give a significant. increasing in motility percentage and a significant. decreasing in DNA damage (P< 0.05) than unprepared human sperm.
Conclusion(s): Swim up technique for sperm preparation is increasing motility and decreasing DNA damage.
Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreBackground: Atelectasis occurs regularly after induction of general anesthesia in bariatric surgery, persists postoperatively, and may contribute to significant postoperative morbidity. Intraoperative recruitment maneuver improve lung ventilation, oxygenation and lung mechanics.
Objectives: The aim of this study was to compare the effects of recruitment maneuver on oxygen saturation, end tidal carbon dioxide and lung mechanics in two Groups; the volume control group and pressure control group with fixed level of PEEP.
Patient and Method: Forty patients, BMI >35 kg/ m2, who have no major obstructive or restrictive respiratory disorders where allocated in two group
... Show MorePatients are very concerned about the lengthy nature of orthodontic treatment. It is necessary to find a non-invasive way to quicken physiologic tooth movement. This study's objective was to assess the effectiveness of low-intensity laser therapy in shortening the time and discomfort of orthodontic treatment. Experimental work: Using a split-mouth study to compare tooth movement with conventional treatment and laser-accelerated orthodontic tooth movement. A patient presenting with a class II division I malocclusion characterized by the misalignment of the upper and lower teeth as classified by Angle’s molar classification system was indicated to undergo fixed orthodontic appliance orthodontic treatment. The treatment plan involved bila
... Show MoreCharge multipole Coulomb scattering form factors in 48Ca nucleus have been reproduced utilizing the theory of nuclear shell. The efficient two-body nuclear potential fpbm is considered to construct the-spin orbit term LS vectors with Harmonic Oscillator HO potential as a wave function of single particle in Fp shell. Discarded spaces ( core + higher configuration) are taken into account through the Core polarization effect by model space with accurate two-body potential of Gogny to interact the LS operating particles with the discarded space pair ( particle-hole) with energy of excitation equal to 2ћω. Gogny interaction has been selected as it had succeeded in nuclear shell theory. The computed results were compared with th
... Show MoreThe object of conformity of the goods to the contract has always played a central role in both national and international sales transactions as it goes to very essence of the contractual relationship. The seller must deliver goods which are of the quantity, quality, and description required by the contract. Only once the goods have been delivered, the buyer has a duty to inspect the goods and eventually notify the seller whenever the product received breaches the conformity requirements set by Article /35 of CISG 1980. But the buyer losses the right to rely on the lack of conformity of the goods if he does not give notice to the seller specifying the nature of the lack of conformity within a reasonable time after he has discovered it or
... Show MoreThis study aimed at indicators of technical analysis and their impact on a group of trading stock indices related to it, by standing on the methods used in technical analysis and its various models, diagnosing the obstacles and difficulties that the participants face in predicting stock prices, and proposing solutions and recommendations to overcome and overcome them. From a scientific and practical perspective.
Where the research community consisted of (25) Iraqi private commercial banks, while the research sample consisted of (3) banks with a percentage of (12%) of the research community. The study used the analytical approach to the financial statements during the period between (1/2/ 2022-30/4/2022),
... Show MoreIn regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement
... Show MoreAcinetobacter baumannii received attention for its multi-drug resistant associated with many severe infections and outbreaks in clinical environment. The aims of the study are to investigate the antibiotic susceptibility profile of clinically isolated A. baumannii, biofilm production, and the efficiency of Low Frequency Ultrasound (LFU) and honey to attenuate biofilm production. A total of 100 samples were taken from different sources from Baghdad hospitals. The susceptibility patterns revealed the percentage of pan drug resistant (PDR) isolates were 1.5 %, 72.7 % were extended drug resistant (XDR), 16.7 % were multidrug resistant (MDR), and 9.1 % were non MDR and sensitive to most antibiotics used. The ability to form
... Show MoreBefore users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation stra
... Show More